First published: Tue Jul 22 2014(Updated: )
A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO acceptor for continuation tokens. An unauthenticated attacker could use this flaw to crash the server acceptor. It is reported that this issue affects version 1.5 and later. Upstream commit and further details: <a href="https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b">https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Kerberos | >1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1121877 is critical due to the potential for an unauthenticated attacker to crash the server acceptor.
To fix REDHAT-BUG-1121877, upgrade to the latest patched version of MIT Kerberos that addresses this NULL pointer dereference flaw.
REDHAT-BUG-1121877 affects MIT Kerberos versions 1.5 and later.
REDHAT-BUG-1121877 describes a NULL pointer dereference flaw in the SPNEGO acceptor.
Yes, an unauthenticated attacker can exploit REDHAT-BUG-1121877 remotely to crash the server.